Sorry, never meant to imply you can. The main fix was to lock down the point of entry not to just revert the files.
That said, some of the steps listed in those are just shotgun approaches for if you don’t know how the files were altered, and don’t have some good way such as version control or differential backup comparison to tell what was altered, or log analysis tools, etc…
You should still rebuild the server, change all the passwords, etc… However sometimes it’s important to stop the problem and schedule the rest a little later.
Just taking an immediate shotgun approach isn’t perfect either, because if you are dealing with a 0 day exploit, you could be just as open after all that work of rebuilding. So it is still important to figure out what happened and know how to to block it.